Skip to navigation

Bug Fix Advisory kexec-tools bug fix update

Advisory: RHBA-2011:0505-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-05-11
Last updated on: 2011-05-11
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.6.z server)
Red Hat Enterprise Linux Long Life (v. 5.6 server)

Details

An updated kexec-tools package that fixes one bug is now available for Red Hat
Enterprise Linux 5.

The kexec fastboot mechanism allows booting a Linux kernel from the context of
an already running kernel. The kexec-tools package provides the /sbin/kexec
binary and ancillary utilities that form the user-space component of the
kernel's kexec feature.

This update fixes the following bug:

* On x86 systems with a Physical Address Extension (PAE) kernel, the previous
version of kexec-tools incorrectly attempted to use a reserved memory range and
failed to create a valid core dump. This rendered the crash utility unable to
read vmalloc addresses, and any attempt to analyze such a dump file caused the
utility to display the following message:

WARNING: cannot access vmalloc'd module memory

This update applies a patch that prevents kexec-tools from incorrectly accessing
a reserved memory range. Now, kexec-tools can generate core dump files that the
crash utility can handle. (BZ#696547)

All users of kexec-tools are advised to upgrade to this updated package, which
fixes this bug.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kexec-tools-1.102pre-126.el5_6.6.src.rpm
File outdated by:  RHBA-2013:1321
    MD5: c7ead68f7a72cb1f063b0a262eaf1058
SHA-256: 38ab2281542e5297a9266508d38f6cb3a6e443419f940224c7f16ce0698aff1e
 
IA-32:
kexec-tools-1.102pre-126.el5_6.6.i386.rpm
File outdated by:  RHBA-2013:1321
    MD5: 08ecae1bd5f066a7673b28e5b4739b9f
SHA-256: b0a9d69392cc31e2f0c0bde3cd91f0eddade7e607950bf2fbee9afc6b1910441
 
IA-64:
kexec-tools-1.102pre-126.el5_6.6.ia64.rpm
File outdated by:  RHBA-2013:1321
    MD5: 5387b4f095367744ae584e409716cd18
SHA-256: 6779ac49f1027f253bd5e3a01375076e75f9d6e2ef4f73269ae59643b9d98a8b
 
PPC:
kexec-tools-1.102pre-126.el5_6.6.ppc64.rpm
File outdated by:  RHBA-2013:1321
    MD5: 377d7f7546a3689914a0975f428ee41b
SHA-256: 2769466034a51a985878ec5f026a41a8dee749a983166b99c17fc286010c3dc1
 
s390x:
kexec-tools-1.102pre-126.el5_6.6.s390x.rpm
File outdated by:  RHBA-2013:1321
    MD5: bb65f6fe20c2a5f2b5f0715502a84da8
SHA-256: 849b11e5853fea8291ba9851fa90abf8d43a56ee2cf6f8cfb1aa9b158588fd02
 
x86_64:
kexec-tools-1.102pre-126.el5_6.6.x86_64.rpm
File outdated by:  RHBA-2013:1321
    MD5: 8cbacf721877747f99d15c6ee0bcdf03
SHA-256: ddf900b113206fc7b8ee9eb7aafad48d525318e5ac94b802d24b8c4fca493aed
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kexec-tools-1.102pre-126.el5_6.6.src.rpm
File outdated by:  RHBA-2013:1321
    MD5: c7ead68f7a72cb1f063b0a262eaf1058
SHA-256: 38ab2281542e5297a9266508d38f6cb3a6e443419f940224c7f16ce0698aff1e
 
IA-32:
kexec-tools-1.102pre-126.el5_6.6.i386.rpm
File outdated by:  RHBA-2013:1321
    MD5: 08ecae1bd5f066a7673b28e5b4739b9f
SHA-256: b0a9d69392cc31e2f0c0bde3cd91f0eddade7e607950bf2fbee9afc6b1910441
 
x86_64:
kexec-tools-1.102pre-126.el5_6.6.x86_64.rpm
File outdated by:  RHBA-2013:1321
    MD5: 8cbacf721877747f99d15c6ee0bcdf03
SHA-256: ddf900b113206fc7b8ee9eb7aafad48d525318e5ac94b802d24b8c4fca493aed
 
Red Hat Enterprise Linux EUS (v. 5.6.z server)

SRPMS:
kexec-tools-1.102pre-126.el5_6.6.src.rpm
File outdated by:  RHBA-2013:1321
    MD5: c7ead68f7a72cb1f063b0a262eaf1058
SHA-256: 38ab2281542e5297a9266508d38f6cb3a6e443419f940224c7f16ce0698aff1e
 
IA-32:
kexec-tools-1.102pre-126.el5_6.6.i386.rpm     MD5: 08ecae1bd5f066a7673b28e5b4739b9f
SHA-256: b0a9d69392cc31e2f0c0bde3cd91f0eddade7e607950bf2fbee9afc6b1910441
 
IA-64:
kexec-tools-1.102pre-126.el5_6.6.ia64.rpm     MD5: 5387b4f095367744ae584e409716cd18
SHA-256: 6779ac49f1027f253bd5e3a01375076e75f9d6e2ef4f73269ae59643b9d98a8b
 
PPC:
kexec-tools-1.102pre-126.el5_6.6.ppc64.rpm     MD5: 377d7f7546a3689914a0975f428ee41b
SHA-256: 2769466034a51a985878ec5f026a41a8dee749a983166b99c17fc286010c3dc1
 
s390x:
kexec-tools-1.102pre-126.el5_6.6.s390x.rpm     MD5: bb65f6fe20c2a5f2b5f0715502a84da8
SHA-256: 849b11e5853fea8291ba9851fa90abf8d43a56ee2cf6f8cfb1aa9b158588fd02
 
x86_64:
kexec-tools-1.102pre-126.el5_6.6.x86_64.rpm     MD5: 8cbacf721877747f99d15c6ee0bcdf03
SHA-256: ddf900b113206fc7b8ee9eb7aafad48d525318e5ac94b802d24b8c4fca493aed
 
Red Hat Enterprise Linux Long Life (v. 5.6 server)

SRPMS:
kexec-tools-1.102pre-126.el5_6.6.src.rpm
File outdated by:  RHBA-2013:1321
    MD5: c7ead68f7a72cb1f063b0a262eaf1058
SHA-256: 38ab2281542e5297a9266508d38f6cb3a6e443419f940224c7f16ce0698aff1e
 
IA-32:
kexec-tools-1.102pre-126.el5_6.6.i386.rpm     MD5: 08ecae1bd5f066a7673b28e5b4739b9f
SHA-256: b0a9d69392cc31e2f0c0bde3cd91f0eddade7e607950bf2fbee9afc6b1910441
 
IA-64:
kexec-tools-1.102pre-126.el5_6.6.ia64.rpm     MD5: 5387b4f095367744ae584e409716cd18
SHA-256: 6779ac49f1027f253bd5e3a01375076e75f9d6e2ef4f73269ae59643b9d98a8b
 
x86_64:
kexec-tools-1.102pre-126.el5_6.6.x86_64.rpm     MD5: 8cbacf721877747f99d15c6ee0bcdf03
SHA-256: ddf900b113206fc7b8ee9eb7aafad48d525318e5ac94b802d24b8c4fca493aed
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/